Malware Classification

A Quick Reference Cheat Sheet

TypeSelf-Replicates?Needs Host?Network Spread?StealthPrimary Goal
Virus
Yes Yes NoMediumInfect & spread via files
Worm
Yes No YesLow-MedRapid network propagation
Trojan
No No NoMediumDeceive user for access
Ransomware
Sometimes No SometimesLowExtort money via encryption
Spyware
No No NoHighMonitor & steal data
Keylogger
No No NoHighRecord keystrokes
Rootkit
No No NoVery HighHide & maintain admin access
Backdoor
No No NoHighProvide remote access
Botnet
Sometimes No YesMediumDistributed control network
Fileless
Sometimes No SometimesVery HighMemory-only operation

Key Malware Categories

By Spread Method

Virus: Attaches to host files. Spreads when files are shared.

Worm: Self-replicates across networks automatically. No user action needed.

Trojan: Disguised as legitimate software. Tricks users into installation.

By Objective

Ransomware: Encrypts files, demands payment for decryption.

Spyware: Secretly monitors activities and steals information.

Rootkit: Hides presence while maintaining admin-level control.

Advanced Types

Fileless: Lives only in memory (RAM). No disk footprint.

Polymorphic: Changes code signature each infection to evade detection.

APT Malware: Sophisticated, targeted attacks for long-term access.